summaryrefslogtreecommitdiff
path: root/comms
AgeCommit message (Collapse)AuthorFilesLines
2013-05-12Whoops missed updating sound tarball in 11.3.0 update. Fixed.jnemeth2-5/+122
Thanks to joerg@ for pointing it out.
2013-05-09Massive revbump after updating graphics/ilmbase, graphics/openexr, textproc/icu.adam13-23/+26
2013-05-05Update to Asterisk 11.3.0: this is a bugfix release.jnemeth6-60/+62
The Asterisk Development Team has announced the release of Asterisk 11.3.0. The release of Asterisk 11.3.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix issue where chan_mobile fails to bind to first available port * --- Fix Queue Log Reporting Every Call COMPLETECALLER With "h" Extension Present * --- Retain XMPP filters across reconnections so external modules continue to function as expected. * --- Ensure that a declined media stream is terminated with a '\r\n' * --- Fix pjproject compilation in certain circumstances For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.3.0 Thank you for your continued support of Asterisk!
2013-04-24Revbump for all packages that have USE_TOOLS+=gssbd1-2/+2
2013-04-18Update to Asterisk 1.8.21.0: this is a bug fix updatejnemeth5-50/+169
The Asterisk Development Team has announced the release of Asterisk 1.8.21.0. The release of Asterisk 1.8.21.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix issue where chan_mobile fails to bind to first available port * --- Fix station ringback; trunk hangup issues in SLA * --- Fix Queue Log Reporting Every Call COMPLETECALLER With "h" Extension Present * --- Fix Record-Route parsing for large headers. * --- Fix AMI redirect action with two channels failing to redirect both channels. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.21.0 Thank you for your continued support of Asterisk!
2013-04-10Update to Asterisk 11.2.2: this is a security update which fixesjnemeth2-10/+9
AST-2013-001, AST-2013-002, and AST-2013-003. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones, and 11.2.2. The release of these versions resolve the following issues: * A possible buffer overflow during H.264 format negotiation. The format attribute resource for H.264 video performs an unsafe read against a media attribute when parsing the SDP. This vulnerability only affected Asterisk 11. * A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed in January of this year, contained a fix for Asterisk's HTTP server for a remotely-triggered crash. While the fix prevented the crash from being triggered, a denial of service vector still exists with that solution if an attacker sends one or more HTTP POST requests with very large Content-Length values. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 * A potential username disclosure exists in the SIP channel driver. When authenticating a SIP request with alwaysauthreject enabled, allowguest disabled, and autocreatepeer disabled, Asterisk discloses whether a user exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.2.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf Thank you for your continued support of Asterisk!
2013-04-10Update to Asterisk 10.12.2: this is a security update which fixesjnemeth2-10/+9
AST-2013-001, AST-2013-002, and AST-2013-003. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones, and 11.2.2. The release of these versions resolve the following issues: * A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed in January of this year, contained a fix for Asterisk's HTTP server for a remotely-triggered crash. While the fix prevented the crash from being triggered, a denial of service vector still exists with that solution if an attacker sends one or more HTTP POST requests with very large Content-Length values. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 * A potential username disclosure exists in the SIP channel driver. When authenticating a SIP request with alwaysauthreject enabled, allowguest disabled, and autocreatepeer disabled, Asterisk discloses whether a user exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.12.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf Thank you for your continued support of Asterisk!
2013-04-10Update to Asterisk 1.2.20.2: this is a security update which fixesjnemeth2-10/+9
AST-2013-001, AST-2013-002, and AST-2013-003. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones, and 11.2.2. The release of these versions resolve the following issues: * A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed in January of this year, contained a fix for Asterisk's HTTP server for a remotely-triggered crash. While the fix prevented the crash from being triggered, a denial of service vector still exists with that solution if an attacker sends one or more HTTP POST requests with very large Content-Length values. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 * A potential username disclosure exists in the SIP channel driver. When authenticating a SIP request with alwaysauthreject enabled, allowguest disabled, and autocreatepeer disabled, Asterisk discloses whether a user exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.20.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf Thank you for your continued support of Asterisk!
2013-04-07Edited DESCR in the case of:rodent2-62/+41
File too long (should be no more than 24 lines). Line too long (should be no more than 80 characters). Trailing empty lines. Trailing white-space. Trucated the long files as best as possible while preserving the most info contained in them.
2013-04-07Revert: these packages are marked OWNER= for a reason!jnemeth2-6/+4
pkglint warnings aren't gospel! They need to be verified in an intelligent manner. After variable substitution, the lines will be shorter then 80 characters, thus there was no need to shorten them.
2013-04-06"Line too long (should be no more than 80 characters)."rodent2-4/+6
2013-04-06Fixes:rodent1-2/+2
COMMENT should not be longer than 70 characters. COMMENT should not begin with 'A'. COMMENT should not begin with 'An'. COMMENT should not begin with 'a'. COMMENT should not end with a period. COMMENT should start with a capital letter. pkglint warnings. Some files also got minor formatting, spelling, and style corrections.
2013-03-29The printer port support is experimental, and only supported on somedsainty4-11/+20
platforms. Disable it for consistency, using a patch since --disable-PRINTER only works on Linux.
2013-03-28At least on the BSDs, the parallel port support is always included.joerg1-1/+2
2013-03-28utmpx.h is no longer included by util.h, adjust. Fix inline use.joerg7-14/+143
2013-03-21Linux fixes:sbd2-1/+19
1) Install udev 60-openobex.rules config file. 2) Add Linux plist entries.
2013-03-21Make sure that bt_addr_t is defined.sbd2-1/+19
2013-03-21Add doxygen build dependssbd1-1/+3
2013-03-15bump PKGREVISION for openobex updateplunky1-2/+3
while here, add LICENCE
2013-03-15bump PKGREVISION for openobex updateplunky7-20/+67
fix build for openobex 1.7 add LICENCE update MASTER_SITE (=sourceforge)
2013-03-15bump PKGREVISION for openobex updateplunky1-2/+2
2013-03-15Update to ObexFTP 0.24plunky16-684/+33
There is a new maintainer, Hendrik Sattler and the sources are held at gitorius.org. Build is changed to CMake and although it does not appear in the ChangeLog below, I forwarded all the NetBSD related patches that pkgsrc had (and more in fact, to get it working) although I would still say that obexapp is the better program. From the ChangeLog: ObexFTP 0.24 (released 2013-03-05) ---------------------------------- * Maintainer changed from Christian to Hendrik * change build system to using CMake * integrate obexfs-0.12 * fix build for OpenOBEX-1.7 ObexFTP 0.23 (released 2009-02-17) ---------------------------------- * allow win32 to use hci src names * adding a simpler connect wrapper * show OBEX_HandleInput errors * catch errors and let the user know * print timeout stats if available * sdp unregister more verbose * upgrading btkit * fix for win32 without bt * replacing deprecated automake vars * sizeof() fixes * removing bdaddr_t reference from obexftpd.c * adding bootstrap helper * concurrency bug in extconf.rb generated Makefile (fix by Alin Năstac) * switching from POD to asciidoc * clearing gnu-style implicit rules ObexFTP 0.22 (released 2008-06-15) ---------------------------------- * added proper unicode support * added support for transparent OBEX-over-AT mode * rewritten at-command function * added specific error messages * refactored to flexible bt_kit layer * fixed cache root duplicates * fixed off-by-one and unfreed mem in cache layer * added pkg-config file * added example code * switched to doxygen * added python binding callbacks * portable packed structs * enabled linux hci dev names for source selection * Python binding uses distutils now, tested by Adam Williamson * removed exit from bt discovery * Better autodetection for possible language bindings * reworked win32 support * Motorola SLVR L2 cobex fix by Andrey Rahmatullin * now using AC_HELP_STRING for compat with autoconf <=2.57 * added hci selection support, drafted by Manuel Naranjo * switched obexftp cli to new discovery api * prefer PCSUITE over FTP, req. by Martin Storsjö for Series 60 2nd Ed. * fixed compile error with >=swig-1.3.28 * renamed sdp browse function * fixed month/day swapping in atotime, spotted by Dr. Johannes Zellner * added BFC compatibility for newer Siemens phones * added PCSOFTWARE uuid support for SHARP phones * added motorola support * end bfb mode properly * added CPROT=0 support from 3GPP 27.007 * fixed ericsson init * fixed invalid conn_id in disconnect rep. by Alan J. McFarlane * better create flag handling in setpath * Changed LDADD to LIBADD sug. by Sergey Vlasov <vsu@altlinux.ru> * obexftpd clean up by Hendrik Sattler * 64-bit fixes by Hendrik Sattler * Removed all (dangerous) obex_headerdata_t casts * Reorganized all swig-dependant Makefiles * Applied cobex write patch from Simon Ruggier <Simon80@gmail.com> * Applied from Frode Isaksen <fisaksen@bewan.com> ObexFTP 0.21 (released 2006-06-27) ---------------------------------- 2006-05-26 Christian W. Zuckschwerdt <zany@triq.net> * Fixes to obexftpd suggested by Hendrik Sattler 2006-05-24 Christian W. Zuckschwerdt <zany@triq.net> * Added ruby binding * Added preliminary discovery function
2013-03-15Update to OpenOBEX 1.7. The maintainer has changed, to Hendrik Sattlerplunky5-44/+85
and the sources are now stored at gitorius.org. The build system is changed to CMake From the ChangeLog: ver 1.7: Add support for CMake config files Internal code reorganisation and rewrite Add new function set for better control than OBEX_HandleInput(): * OBEX_SetTimeout(), * OBEX_Work() and * OBEX_GetDataDirection() ver 1.6: Change ABI from 1 to 2 because: * Redo the USB changes from version 1.4 * Remove InOBEX_* function, use the TcpOBEX_* functions instead * Remove the simple Unicode<->ASCII functions Add support for Single Response Mode Add manpages for all example applications Add udev support Add new example app to find IrDA and USB OBEX devices Add fixes for FreeBSD Add support for libusb-1.x Add support for close-on-exec
2013-03-06Not as MAKE_JOBS_SAFE as you'd like.dsainty1-1/+2
2013-02-22Update homepage URLs.shattered1-2/+2
2013-02-19Fix package build for MACHINE_ARCH == x86_64dsainty2-5/+8
2013-02-16Recursive bump for png-1.6.wiz13-23/+26
2013-02-16Recursive bump for png-1.6.wiz2-4/+4
2013-02-11SUBDIR+=java-rxtxdsainty1-1/+2
2013-02-11Add RXTX version 2.1-7r2.dsainty11-0/+210
RXTX is a Java library, using a native implementation (via JNI), providing serial and parallel communication for the Java Development Toolkit (JDK). It is based on the specification for Sun's Java Communications API, though while many of the class descriptions are the same the package used it not, since gnu.io is used instead. A certain amount of compatibility is intended with API, though this project should be considered as a fork and therefore compatible in spirit, but not in implementation.
2013-02-10Update to Asterisk 11.2.1: this is a minor bug fix release.jnemeth2-10/+9
----- 11.2.1: The Asterisk Development Team has announced the release of Asterisk 11.2.1. The release of Asterisk 11.2.1 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: * --- Fix astcanary startup problem due to wrong pid value from before daemon call * --- Update init.d scripts to handle stderr; readd splash screen for remote consoles * --- Reset RTP timestamp; sequence number on SSRC change For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.2.1 Thank you for your continued support of Asterisk! ----- 11.2.0: The Asterisk Development Team has announced the release of Asterisk 11.2.0. The release of Asterisk 11.2.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- app_meetme: Fix channels lingering when hung up under certain conditions * --- Fix stuck DTMF when bridge is broken. * --- Add missing support for "who hung up" to chan_motif. * --- Remove a fixed size limitation for producing SDP and change how ICE support is disabled by default. * --- Fix chan_sip websocket payload handling * --- Fix pjproject compilation in certain circumstances For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.2.0 Thank you for your continued support of Asterisk!
2013-02-10Update to Asterisk 10.12.1: this is a minor bug fix release.jnemeth2-10/+9
----- 10.12.1 The Asterisk Development Team has announced the release of Asterisk 10.12.1. The release of Asterisk 10.12.1 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: * --- Fix astcanary startup problem due to wrong pid value from before daemon call * --- Update init.d scripts to handle stderr; readd splash screen for remote consoles * --- Reset RTP timestamp; sequence number on SSRC change For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.12.1 Thank you for your continued support of Asterisk! ----- 10.12.0 The Asterisk Development Team has announced the release of Asterisk 10.12.0. The release of Asterisk 10.12.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- app_meetme: Fix channels lingering when hung up under certain conditions * --- Fix stuck DTMF when bridge is broken. * --- Improve Code Readability And Fix Setting natdetected Flag * --- Fix extension matching with the '-' char. * --- Fix call files when astspooldir is relative. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.12.0 Thank you for your continued support of Asterisk!
2013-02-09Bump PKGREVISION from audio/jack.ryoon1-2/+2
2013-02-07Update to Asterisk 1.8.20.1: this is a minor bugfix releasejnemeth2-10/+9
----- 1.8.20.1 The Asterisk Development Team has announced the release of Asterisk 1.8.20.1. The release of Asterisk 1.8.20.1 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: * --- Fix astcanary startup problem due to wrong pid value from before daemon call * --- Update init.d scripts to handle stderr; readd splash screen for remote consoles * --- Reset RTP timestamp; sequence number on SSRC change For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.20.1 Thank you for your continued support of Asterisk! ----- 1.8.20.0 The Asterisk Development Team has announced the release of Asterisk 1.8.20.0. The release of Asterisk 1.8.20.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- app_meetme: Fix channels lingering when hung up under certain conditions * --- Fix stuck DTMF when bridge is broken. * --- Improve Code Readability And Fix Setting natdetected Flag * --- Fix extension matching with the '-' char. * --- Fix call files when astspooldir is relative. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.20.0 Thank you for your continued support of Asterisk!
2013-02-06PKGREVISION bumps for the security/openssl 1.0.1d update.jperkin11-21/+22
2013-01-29Fix the VARBASE propagation to all utilities. Without this, we triedis4-16/+28
to log to /spool/fax/Faxlog.
2013-01-26Revbump after graphics/jpeg and textproc/icuadam20-36/+40
2013-01-04Update to Asterisk 11.1.2: this is a security update for AST-2012-014jnemeth2-9/+9
and AST-2012-015. Apparently the last update didn't completely fix the issues. The Asterisk Development Team has announced a security release for Asterisk 11, Asterisk 11.1.2. This release addresses the security vulnerabilities reported in AST-2012-014 and AST-2012-015, and replaces the previous version of Asterisk 11 released for these security vulnerabilities. The prior release left open a vulnerability in res_xmpp that exists only in Asterisk 11; as such, other versions of Asterisk were resolved correctly by the previous releases. The release of these versions resolve the following two issues: * Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. The vulnerabilities in SIP and HTTP were corrected in a prior release of Asterisk; the vulnerability in XMPP is resolved in this release. * A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. Handling the cachability of device states aggregated via XMPP is handled in this release. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015. For a full list of changes in the current release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf Thank you for your continued support of Asterisk - and we apologize for having to do this twice!
2013-01-03de to Asterisk 1.8.19.1; this is a security fix to fix AST-2012-14jnemeth2-10/+9
and AST-2012-015. Approved for commit during freeze by: agc The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones, and 11.1.1. The release of these versions resolve the following two issues: * Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. * A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf Thank you for your continued support of Asterisk!
2013-01-03Upgrade to Asterisk 10.11.1; this is a security fix to fix AST-2012-14jnemeth2-10/+9
and AST-2012-015. Approved for commit during freeze by: agc The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones, and 11.1.1. The release of these versions resolve the following two issues: * Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. * A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf Thank you for your continued support of Asterisk!
2013-01-03Upgrade to Asterisk 11.1.1; this is a security fix to fix AST-2012-14jnemeth2-10/+9
and AST-2012-015. Approved for commit during freeze by: agc The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones, and 11.1.1. The release of these versions resolve the following two issues: * Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. * A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf Thank you for your continued support of Asterisk!
2012-12-25Use correct enum.joerg2-1/+15
2012-12-25Fix build failure on some Linuxes if CHECK_INTERPRETER=yescheusov1-3/+8
2012-12-17Added comms/deforaos-phone (version 0.3.11)khorben1-1/+2
2012-12-17Imported wip/deforaos-phone, the DeforaOS telephony application, underkhorben5-0/+108
comms/deforaos-phone (version 0.3.11)
2012-12-16recursive bump from cyrus-sasl libsasl2 shlib major bump.obache5-7/+10
2012-12-15Bump PKGREVISION from devel/nss 3.14.0.ryoon3-6/+6
2012-12-14Update to Asterisk 10.11.0: this is minor bugfix release.jnemeth3-32/+9
Note that Asterisk 10.* will be going into security fix only mode on Dec. 15th, 2012. Users may wish to consider moving to one of the Long Term Support versions: comms/asterisk18 (Asterisk 1.8.*) or comms/asterisk (which currently has Asterisk 11.*). See https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions for information on Asterisk versions. ----- 10.11.0: The Asterisk Development Team has announced the release of Asterisk 10.11.0. The release of Asterisk 10.11.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Prevent resetting of NATted realtime peer address on reload. * --- Do not use a FILE handle when doing SIP TCP reads. * --- Fix ConfBridge crash if no timing module loaded. * --- confbridge: Fix a bug which made conferences not record with AMI/CLI commands * --- Fix execution of 'i' extension due to uninitialized variable. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.11.0 Thank you for your continued support of Asterisk! ----- 10.10.1: The Asterisk Development Team has announced the release of Asterisk 10.10.1. The release of Asterisk 10.10.1 resolves an issue reported by the community and would have not been possible without your participation. Thank you! The following is the issue resolved in this release: * --- chan_local: Fix local_pvt ref leak in local_devicestate(). For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.10.1 Thank you for your continued support of Asterisk!
2012-12-14Update to Asterisk 1.8.19.0: this is a bugfix release.jnemeth3-32/+9
----- 1.8.19.0: The Asterisk Development Team has announced the release of Asterisk 1.8.19.0. The release of Asterisk 1.8.19.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Prevent resetting of NATted realtime peer address on reload. * --- Do not use a FILE handle when doing SIP TCP reads. * --- Fix execution of 'i' extension due to uninitialized variable. * --- Ensure that the Queue application tracks busy members in off nominal situations * --- Properly extract the Body information of an EWS calendar item For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.19.0 Thank you for your continued support of Asterisk! ----- 1.8.18.1: The Asterisk Development Team has announced the release of Asterisk 1.8.18.1. The release of Asterisk 1.8.18.1 resolves an issue reported by the community and would have not been possible without your participation. Thank you! The following is the issue resolved in this release: * --- chan_local: Fix local_pvt ref leak in local_devicestate(). For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.18.1 Thank you for your continued support of Asterisk!
2012-12-13remove obsolete patches (replaced by patch-estic-*.cc)wiz2-0/+0